IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

PDA Security

RSS Feed    Add to Google    Add to My Yahoo!
PDA Security Reports
 
Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

An effective mobile device security policy
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

SearchSecurity.com

A Mobile Application Management Primer for IT
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

SearchSecurity.com

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Symantec Corporation

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012

BlackBerry

Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization
sponsored by Bradford Networks
WHITE PAPER: With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and more at-risk every day. In this paper, explore this increasing issue, and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Bradford Networks

Mobility is moving fast. To stay in control, you have to prepare for change
sponsored by IBM
WHITE PAPER: The practice of BYOD is on the rise and organizations cannot sit back and let employees roam the network with unsupervised devices. It’s time to take action and tackle the common issues and consequences of BYOD. In this paper, uncover seven (7) questions BYOD raises and how you can address them.
Posted: 25 Apr 2012 | Published: 25 Apr 2012

IBM

Survive and Thrive: Tackling Choice, Consumerization and Cloud with BlackBerry Enterprise Server 5.0
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: In this presentation transcript, Sean McManus, RIM Director of Platform Advocacy, discusses the key trends in mobile computing today, and how to stay ahead with BlackBerry Enterprise Portfolio. View now to explore how you can effectively balance choice, security, flexibility and control over your enterprise mobile devices.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement